Analysis, Development and Deployment of Statistical Anomaly Detection Techniques for Real E-Mail Traffic

作者: Gianluca Papaleo , Davide Chiarella , Maurizio Aiello , Luca Caviglione

DOI: 10.4018/978-1-61350-507-6.CH003

关键词:

摘要:

参考文章(25)
Maurizio Aiello, Davide Chiarella, Gianluca Papaleo, Statistical Anomaly Detection on Real e-Mail Traffic CISIS. pp. 170- 177 ,(2009) , 10.1007/978-3-540-88181-0_22
David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian Grizzard, John Levine, Henry Owen, HoneyStat: Local Worm Detection Using Honeypots recent advances in intrusion detection. pp. 39- 58 ,(2004) , 10.1007/978-3-540-30143-1_3
Eugene H. Spafford, Sandeep Kumar, A Software Architecture to Support Misuse Intrusion Detection ,(1995)
Juan M. Estevez-Tapiador, Pedro Garcia-Teodoro, Jesus E. Diaz-Verdejo, Anomaly detection methods in wired networks: a survey and taxonomy Computer Communications. ,vol. 27, pp. 1569- 1584 ,(2004) , 10.1016/J.COMCOM.2004.07.002
Luca Caviglione, Cristiano Cervellera, Design of a peer-to-peer system for optimized content replication Computer Communications. ,vol. 30, pp. 3107- 3116 ,(2007) , 10.1016/J.COMCOM.2007.05.041
Cristiano Cervellera, Luca Caviglione, Optimization of a peer-to-peer system for efficient content replication European Journal of Operational Research. ,vol. 196, pp. 423- 433 ,(2009) , 10.1016/J.EJOR.2008.03.048
Cliff Changchun Zou, Lixin Gao, Weibo Gong, Don Towsley, Monitoring and early warning for internet worms computer and communications security. pp. 190- 199 ,(2003) , 10.1145/948109.948136
Theuns Verwoerd, Ray Hunt, Intrusion detection techniques and approaches Computer Communications. ,vol. 25, pp. 1356- 1365 ,(2002) , 10.1016/S0140-3664(02)00037-3